Introduction to core componentsAmazon EC2 instancesDefinition and types of instancesInstance lifecycle and instance statesInstance state and instance lifecycle use cases for instance managementInstance metadata and user dataWhat is instance metadata and user data?How to avoid instance impersonation attacks with instance identity documentsExample of an instance identity documentSteps to retrieving an instance identity documentInstance purchasing options – On-Demand, Spot, and Reserved InstancesAmazon Machine Images (AMIs)Core components of AMIsEBSTypes of EBS volumesEBS snapshots and backupsENIs – fundamentals, configuration, and use casesUnderstanding ENIs, their properties, and configuration optionsAttaching, detaching, and managing ENIsSecurity and performance implicationsUse cases for multiple ENIsEnhanced networking – fundamentals, capabilities, and use casesSupported instance types and enabling enhanced networkingENA use casesEFA – fundamentals, capabilities, and use casesSignificant features of EFASecurity groups and key pairsSecurity groups – virtual firewalls for your instancesKey pairs – secure authentication for your instancesBest practices for security groups and key pairsSummary